W3 Total Cache Plugin For WordPress Cache Key XSS

medium Nessus Plugin ID 80553

Synopsis

The remote web server hosts a PHP script that is affected by a cross-site scripting vulnerability.

Description

The version of the W3 Total Cache plugin for WordPress hosted on the remote web server fails to properly sanitize user-supplied input to the 'Cache key' in the HTML comments displayed when 'Page cache debug info' is enabled. An attacker can exploit this to execute arbitrary script code within the context of the user's browser.

Note that this plugin for WordPress is also reportedly affected by multiple cross-site request forgery (XSRF) vulnerabilities; however, Nessus has not tested for these.

Solution

Upgrade to version 0.9.4.1 or later.

See Also

https://www.secuvera.de/advisories/secuvera-SA-2014-01.txt

https://wordpress.org/plugins/w3-total-cache/#changelog

Plugin Details

Severity: Medium

ID: 80553

File Name: wordpress_w3_total_cache_debug_xss.nasl

Version: 1.7

Type: remote

Published: 1/15/2015

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress, cpe:/a:w3edge:total_cache

Required KB Items: installed_sw/WordPress, www/PHP

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 12/10/2014

Vulnerability Publication Date: 12/10/2014

Reference Information

CVE: CVE-2014-8724

BID: 71665

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990